Answer Posted / girl
it is very secured
| Is This Answer Correct ? | 0 Yes | 2 No |
Post New Answer View All Answers
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What is the difference between a virus and malware?
What does cia stand for in security management?
What is a ddos attack?
What are the different types of network security?
What is Imaging/ghosting?
What is the difference between a switch and a hub?
What are the main components of the CERT Taxonomy?
What is the difference between ripv1 & ripv2?
What are the types of LAN cables used? What is a cross cable?
Explain how do we use rsa for both authentication and secrecy?
What are manageable and non manageable switches?
What are worms?
Is vpn traffic encrypted?
Why should you care about the OSI Reference Model